General

  • Target

    2024-04-20_4392d8076c0f268674fa68ab3a6907f5_cryptolocker

  • Size

    49KB

  • MD5

    4392d8076c0f268674fa68ab3a6907f5

  • SHA1

    0cfacfc2d20038cefd2d29d32684bae7f0e0aebb

  • SHA256

    6f6e924e095fb86900bf1c1e846a513a9f828c3262c86c27d34f11df7f8768dd

  • SHA512

    7e20b96ebe8b9f9ba12a8c1b28dbb4d49b65a7a576aff4aa2d2d48e253cb65bdfa108a19b0f6694c590624c167c32e40ed1e668b14faf799bfb332db9fd5a49f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccY:qmbhXDmjr5MOtEvwDpj5cDtKkQZQa

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_4392d8076c0f268674fa68ab3a6907f5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections